Friday 28 March 2025, 10am - 2pm Zurich

Friday 28 March 2025, 10am - 2pm Zurich

Zero
Trust Roundtable

Zero
Trust Roundtable

The critical role of certificate management in digital identity security programs

The critical role of certificate management in digital identity security programs

Hero Image
Hero Image
Hero Image
Hero Shape
Shape
Shape
Shape
Shape
Shape
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
Left Shape
Left Shape
Right Shape

About the event

About the event

About the event

Learn about strategies and tools to defend your company against the growing threat of attacks leveraging machine identities.

We meet in a confidential setting, following the Chatham House Rule, which means you are welcome to use and share information about what you learn but not who told you and where they work. This enables an open exchange of valuable insights.

Learn about strategies and tools to defend your company against the growing threat of attacks leveraging machine identities.

We meet in a confidential setting, following the Chatham House Rule, which means you are welcome to use and share information about what you learn but not who told you and where they work. This enables an open exchange of valuable insights.

Learn about strategies and tools to defend your company against the growing threat of attacks leveraging machine identities.

We meet in a confidential setting, following the Chatham House Rule, which means you are welcome to use and share information about what you learn but not who told you and where they work. This enables an open exchange of valuable insights.

Influencer Image
Influencer Image
Influencer Image
Hero Shape
Hero Shape
Hero Shape
Hero Shape
Hero Shape
Influencer Image
Influencer Image
Influencer Image

Learn from peers!

The event is headlined by industry experts and innovators shaping trends and driving product developement in the certificate and identity security space.

The event is headlined by industry experts and innovators shaping trends and driving product developement in the certificate and identity security space.

The event is headlined by industry experts and innovators shaping trends and driving product developement in the certificate and identity security space.

Tomislav Ljubas

Tomislav Ljubas

Tomislav Ljubas

Managing Director Corporate IT & Security at ISS-Stoxx (Deutsche Börse Group)


Managing Director Corporate IT & Security at ISS-Stoxx (Deutsche Börse Group)

Managing Director Corporate IT & Security at ISS-Stoxx (Deutsche Börse Group)

March 28, 2025

March 28, 2025
March 28, 2025

10:00 AM - 10:30 AM

10:00 AM - 10:30 AM

10:00 AM - 10:30 AM

Matt Barker

Matt Barker

Matt Barker

VP & Global Head of Workload Identity Architecture at Venafi/ CyberArk



VP & Global Head of Workload Identity Architecture at Venafi/ CyberArk


VP & Global Head of Workload Identity Architecture at Venafi/ CyberArk


March 28, 2025

March 28, 2025
March 28, 2025

10:40 AM - 11:00 AM

10:40 AM - 11:00 AM

10:40 AM - 11:00 AM

Star Shape
Star Shape
Star Shape

Schedule

Explore the complete event schedule to find out about sessions, speakers, and activities.

28 March
2025
2025
Zero Trust & Certificate Management
Welcome Coffee & Networking
09:00 AM - 10:00 AM
Speaker's Image

New Environments, New Identities, New Threats

10:00 AM - 10:20 AM

By
Tomislav Ljubas

We’ve spent years locking down human authentication—MFA, conditional access, risk-based policies. We’ve made it so hard for attackers to steal a human identity that they’ve moved on… to something much easier. Machines. APIs, service accounts, cloud workloads, containers, IoT devices—all of them have identities. And most are unprotected. Attackers don’t need phishing anymore. They steal API keys, exploit hardcoded credentials, and move laterally through unmanaged machine identities—completely unnoticed. We built a Zero Trust model for people. Now we need one for machines.

Speaker's Image

New Environments, New Identities, New Threats

10:00 AM - 10:20 AM

By
Tomislav Ljubas

We’ve spent years locking down human authentication—MFA, conditional access, risk-based policies. We’ve made it so hard for attackers to steal a human identity that they’ve moved on… to something much easier. Machines. APIs, service accounts, cloud workloads, containers, IoT devices—all of them have identities. And most are unprotected. Attackers don’t need phishing anymore. They steal API keys, exploit hardcoded credentials, and move laterally through unmanaged machine identities—completely unnoticed. We built a Zero Trust model for people. Now we need one for machines.

Speaker's Image

New Environments, New Identities, New Threats

10:00 AM - 10:20 AM

By
Tomislav Ljubas

We’ve spent years locking down human authentication—MFA, conditional access, risk-based policies. We’ve made it so hard for attackers to steal a human identity that they’ve moved on… to something much easier. Machines. APIs, service accounts, cloud workloads, containers, IoT devices—all of them have identities. And most are unprotected. Attackers don’t need phishing anymore. They steal API keys, exploit hardcoded credentials, and move laterally through unmanaged machine identities—completely unnoticed. We built a Zero Trust model for people. Now we need one for machines.

Speaker's Image

1st Roundtable Discussion

10:20 AM - 10:40 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

1st Roundtable Discussion

10:20 AM - 10:40 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

1st Roundtable Discussion

10:20 AM - 10:40 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

A path to extend the Digital Identity Security Platform

10:40 AM - 11:00 AM

By
Matt Barker

Matt will review some of the key use cases Venafi has already solved for customers together with Stefan, before giving an outlook on the product development roadmap and key technology trends for companies looking to manage their machine identities in a central management plain. After CyberArk’s recent acquisition of Venafi Matt is part of the team tasked to rethink digital identity security and will share some of the synergies he sees between the two platforms and how customers can leverage them together for zero trust approaches.

Speaker's Image

A path to extend the Digital Identity Security Platform

10:40 AM - 11:00 AM

By
Matt Barker

Matt will review some of the key use cases Venafi has already solved for customers together with Stefan, before giving an outlook on the product development roadmap and key technology trends for companies looking to manage their machine identities in a central management plain. After CyberArk’s recent acquisition of Venafi Matt is part of the team tasked to rethink digital identity security and will share some of the synergies he sees between the two platforms and how customers can leverage them together for zero trust approaches.

Speaker's Image

A path to extend the Digital Identity Security Platform

10:40 AM - 11:00 AM

By
Matt Barker

Matt will review some of the key use cases Venafi has already solved for customers together with Stefan, before giving an outlook on the product development roadmap and key technology trends for companies looking to manage their machine identities in a central management plain. After CyberArk’s recent acquisition of Venafi Matt is part of the team tasked to rethink digital identity security and will share some of the synergies he sees between the two platforms and how customers can leverage them together for zero trust approaches.

Speaker's Image

2nd Roundtable Discussion

11:00 AM - 11:20 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

2nd Roundtable Discussion

11:00 AM - 11:20 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

2nd Roundtable Discussion

11:00 AM - 11:20 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

Implementing Certificate Management - Lessons Learned

11:20 AM - 11:40 AM

By
Michael Haueter

As the manager of Bedag Informatik AG's Operations Management team Michael has experience implementing Venafis certificate management solution and will address the practical aspects and challenges you will encounter when implementing a new certificate management solution and how to overcome them. Michael will address key factors for successful implementation projects and lessons learned that apply to all companies.

Speaker's Image

Implementing Certificate Management - Lessons Learned

11:20 AM - 11:40 AM

By
Michael Haueter

As the manager of Bedag Informatik AG's Operations Management team Michael has experience implementing Venafis certificate management solution and will address the practical aspects and challenges you will encounter when implementing a new certificate management solution and how to overcome them. Michael will address key factors for successful implementation projects and lessons learned that apply to all companies.

Speaker's Image

Implementing Certificate Management - Lessons Learned

11:20 AM - 11:40 AM

By
Michael Haueter

As the manager of Bedag Informatik AG's Operations Management team Michael has experience implementing Venafis certificate management solution and will address the practical aspects and challenges you will encounter when implementing a new certificate management solution and how to overcome them. Michael will address key factors for successful implementation projects and lessons learned that apply to all companies.

Speaker's Image

3rd Roundtable Discussion

11:40 AM - 12:00 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

3rd Roundtable Discussion

11:40 AM - 12:00 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Speaker's Image

3rd Roundtable Discussion

11:40 AM - 12:00 AM

By
Participants

Questions from the floor, open discussion, and exchange of ideas led by Venafi's Stefan Bartels

Lunch Break & Networking
12:00 PM - 14:00 PM

Questions & Answers

Can’t find the answer you’re looking for?

1. Is there a registration fee?

The event is 100% free, guests will have to pay for travel and accommodation themselves though.

2. How do I know my registration was successful?

Our team will reach out by email and confirm your attendance. We will also inquire about special dietary requirements.

3. Are there opportunities to meet with participants and speakers after the event?

Yes, you are welcome to join our speakers and other participants for lunch after the event and to stick around until evening to continue the conversations!

4. Can I suggest topics to be covered during the event?

Yes, please email us and we will address your questions at the event! Alternatively you can raise topics during the roundtable part of the event and we encourage you do so!

5. Who sponsors the event?

The event is organised by IT District AG with the support of CyberArk

6. Are there any accommodation options near the event venue?

Yes, The Circle is a hotel and office complex just opposite Zurich Airport with plenty of hotel options.

1. Is there a registration fee?

The event is 100% free, guests will have to pay for travel and accommodation themselves though.

2. How do I know my registration was successful?

Our team will reach out by email and confirm your attendance. We will also inquire about special dietary requirements.

3. Are there opportunities to meet with participants and speakers after the event?

Yes, you are welcome to join our speakers and other participants for lunch after the event and to stick around until evening to continue the conversations!

4. Can I suggest topics to be covered during the event?

Yes, please email us and we will address your questions at the event! Alternatively you can raise topics during the roundtable part of the event and we encourage you do so!

5. Who sponsors the event?

The event is organised by IT District AG with the support of CyberArk

6. Are there any accommodation options near the event venue?

Yes, The Circle is a hotel and office complex just opposite Zurich Airport with plenty of hotel options.

1. Is there a registration fee?

The event is 100% free, guests will have to pay for travel and accommodation themselves though.

2. How do I know my registration was successful?

Our team will reach out by email and confirm your attendance. We will also inquire about special dietary requirements.

3. Are there opportunities to meet with participants and speakers after the event?

Yes, you are welcome to join our speakers and other participants for lunch after the event and to stick around until evening to continue the conversations!

4. Can I suggest topics to be covered during the event?

Yes, please email us and we will address your questions at the event! Alternatively you can raise topics during the roundtable part of the event and we encourage you do so!

5. Who sponsors the event?

The event is organised by IT District AG with the support of CyberArk

6. Are there any accommodation options near the event venue?

Yes, The Circle is a hotel and office complex just opposite Zurich Airport with plenty of hotel options.

Join us in Zurich!

Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Cta Image

Join us in Zurich!

Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Cta Image

Join us in Zurich!

Meet likeminded professionals, learn about how others are meeting security challenges, and exchange ideas and lessons learned.

Cta Image